共 32 条
[11]
Detecting Anomalies in Embedded Computing Systems via a Novel HMM-Based Machine Learning Approach
[J].
HYBRID ARTIFICIAL INTELLIGENT SYSTEMS (HAIS 2015),
2015, 9121
:405-415
[12]
Deryckere T., 2008, WORLD WIR MOB MULT N, P1
[13]
Dixon B., 2011, Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11, P27, DOI DOI 10.1145/2046614.2046620
[14]
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2014, 32 (02)
[15]
Kim H, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P239
[16]
Kwon J, 2014, IEEE CONF COMM NETW, P498, DOI 10.1109/CNS.2014.6997523
[17]
Kwong L., 2012, DROIDSCOPE SEAMLESSL
[18]
Li J, 2014, C IND ELECT APPL, P1739, DOI 10.1109/ICIEA.2014.6931449
[19]
Android Malware Detection Based on Static Analysis of Characteristic Tree
[J].
2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY,
2015,
:84-91
[20]
VirusMeter: Preventing Your Cellphone from Spies
[J].
RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS,
2009, 5758
:244-+